Remove 2014 Remove DNS Remove Spyware Remove Surveillance
article thumbnail

Security Affairs newsletter Round 223 – News of the week

Security Affairs

NCSC report warns of DNS Hijacking Attacks. Experts spotted a rare Linux Desktop spyware dubbed EvilGnome. Israel surveillance firm NSO group can mine data from major social media. Copyright (C) 2014-2015 Media.net Advertising FZ-LLC All Rights Reserved -->. The best news of the week with Security Affairs. Kindle Edition.

article thumbnail

Security Affairs newsletter Round 221 – News of the week

Security Affairs

ViceLeaker Android spyware targets users in the Middle East. China installs a surveillance app on tourists phones while crossing in the Xinjiang. Godlua backdoor, the first malware that abuses the DNS over HTTPS (DoH). Copyright (C) 2014-2015 Media.net Advertising FZ-LLC All Rights Reserved -->. Bangladesh Cyber Heist 2.0:

Scams 48
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

APT trends report Q1 2021

SecureList

During routine monitoring of detections for FinFisher spyware tools, we discovered traces that point to recent FinFly Web deployments. It was first publicly documented in 2014, in the aftermath of the Gamma Group hacking incident. FinFly Web is, in essence, a suite of tools and packages that implement a web-based exploitation server.

Malware 138
article thumbnail

NSO mobile Pegasus Spyware used in operations in 45 countries

Security Affairs

A new report published by Citizen Lab revealed that the NSO Pegasus spyware was used against targets across 45 countries worldwide. A new investigation of the Citizen Lab revealed that the powerful Pegasus mobile spyware was used against targets across 45 countries around the world over the last two years. COUNTRY NEXUS.

Spyware 81
article thumbnail

APT trends report Q3 2021

SecureList

In June, more than six months after DarkHalo had gone dark, we observed the DNS hijacking of multiple government zones of a CIS member state that allowed the attacker to redirect traffic from government mail servers to computers under their control – probably achieved by obtaining credentials to the control panel of the victims’ registrar.

Malware 140